Movatterモバイル変換


[0]ホーム

URL:


US20200358803A1 - Composing and applying security monitoring rules to a target environment - Google Patents

Composing and applying security monitoring rules to a target environment
Download PDF

Info

Publication number
US20200358803A1
US20200358803A1US16/407,764US201916407764AUS2020358803A1US 20200358803 A1US20200358803 A1US 20200358803A1US 201916407764 AUS201916407764 AUS 201916407764AUS 2020358803 A1US2020358803 A1US 2020358803A1
Authority
US
United States
Prior art keywords
target environment
entity
program instructions
attack
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US16/407,764
Other versions
US11245716B2 (en
Inventor
Thomas M. Roelofs
Codur S. Pranam
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines CorpfiledCriticalInternational Business Machines Corp
Priority to US16/407,764priorityCriticalpatent/US11245716B2/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATIONreassignmentINTERNATIONAL BUSINESS MACHINES CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: PRANAM, CODUR S., ROELOFS, THOMAS M.
Publication of US20200358803A1publicationCriticalpatent/US20200358803A1/en
Application grantedgrantedCritical
Publication of US11245716B2publicationCriticalpatent/US11245716B2/en
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

In an aspect of the invention, the method includes one or more processors identifying events in the target environment that are associated with an indication of a security attack on the target environment. The method further includes composing rules based on the events and relating to an entity identifier that is fixed over a period of time in relation to an entity in the target environment. The method further includes weighting the rules according to a probability that the rule positively identifies a security attack. The method further correlating outputs of multiple activated rules relating to an entity identifier that are activated over time in response to events occurring in the target environment. The method further includes aggregating weightings from the multiple activated rules. The method further includes determining a score for an entity relating to the entity identifier based on the aggregated weightings.

Description

Claims (20)

What is claimed is:
1. A computer-implemented method comprising:
identifying, by one or more processors, events in a target environment that are associated with an indication of a security attack on the target environment;
composing, by one or more processors, security monitoring rules based on the identified events and relating to an entity identifier that is fixed over a period of time in relation to an entity in the target environment;
weighting, by one or more processors, the security monitoring rules according to a probability that the rule positively identifies the security attack;
correlating, by one or more processors, outputs of multiple activated rules relating to an entity identifier that are activated over time in response to events occurring in the target environment;
aggregating, by one or more processors, weightings from the multiple activated rules;
determining, by one or more processors, a score for an entity relating to the entity identifier based on the aggregated weightings; and
providing, by one or more processors, an alert in response to a score for an entity meeting a threshold.
2. The method as claimed inclaim 1, wherein identifying events in the target environment that are associated with the indication of the security attack on the target environment, further comprises:
defining, by one or more processors, an attack tree that includes events for performed on the target environment, wherein the attack tree defines paths of possible events in the security attack; and
selecting, by one or more processors, features of the attack tree are associated with the indication of the security attack on the target environment.
3. The method as claimed inclaim 1, wherein selecting features is based on a degree of uniqueness of an activity compared to a normal activity in the target environment.
4. The method as claimed inclaim 1, wherein the identified events are based on a combination of essential features in the security attack.
5. The method as claimed inclaim 1, wherein weighting the security monitoring rules according to the probability that the rule positively identifies the security attack is based on an initial configuration with re-adjustment of weightings based on testing and analysis of security incidents in the target environment.
6. The method as claimed inclaim 1, further comprising:
dynamically recalculating, by one or more processors, risk correlation scores further based on security incidents and corresponding re-adjustment of rule weightings.
7. The method as claimed inclaim 1, wherein an entity relates to an asset or person in the target environment and the entity identifier is one or more of: an Internet Protocol address, hostname, user name, media access control (MAC) address, or other entity identifier that is fixed over a period of time in relation to an entity.
8. The method as claimed inclaim 1, wherein determining the score for the entity relating to the entity identifier based on the aggregated weightings further comprises:
producing, by one or more processors, an updated risk correlation score record in response to a rule activation.
9. The method as claimed inclaim 1, further comprising:
aggregating, by one or more processors, weightings from the multiple activated rules utilizing a sliding window of a period of time.
10. A computer program product comprising:
one or more computer readable storage media and program instructions stored on the one or more computer readable storage media, the program instructions comprising:
program instructions to identify events in a target environment that are associated with an indication of a security attack on the target environment;
program instructions to compose security monitoring rules based on the identified events and relating to an entity identifier that is fixed over a period of time in relation to an entity in the target environment;
program instructions to weight the security monitoring rules according to a probability that the rule positively identifies the security attack;
program instructions to correlate outputs of multiple activated rules relating to an entity identifier that are activated over time in response to events occurring in the target environment;
program instructions to aggregate weightings from the multiple activated rules;
program instructions to determine a score for an entity relating to the entity identifier based on the aggregated weightings; and
program instructions to provide an alert in response to a score for an entity meeting a threshold.
11. The computer program product ofclaim 10, wherein the program instructions to identify events in the target environment that are associated with the indication of the security attack on the target environment, further comprise program instructions to:
define an attack tree that includes events for performed on the target environment, wherein the attack tree defines paths of possible events in the security attack; and
select features of the attack tree are associated with the indication of the security attack on the target environment.
12. The computer program product ofclaim 10, wherein selecting features is based on a degree of uniqueness of an activity compared to a normal activity in the target environment.
13. The computer program product ofclaim 10, wherein weighting the security monitoring rules according to the probability that the rule positively identifies the security attack is based on an initial configuration with re-adjustment of weightings based on testing and analysis of security incidents in the target environment.
14. The computer program product ofclaim 10, wherein program instructions to determine the score for the entity relating to the entity identifier based on the aggregated weightings further comprise program instructions to:
produce an updated risk correlation score record in response to a rule activation.
15. A computer system comprising:
one or more computer processors;
one or more computer readable storage media; and
program instructions stored on the computer readable storage media for execution by at least one of the one or more processors, the program instructions comprising:
program instructions to identify events in a target environment that are associated with an indication of a security attack on the target environment;
program instructions to compose security monitoring rules based on the identified events and relating to an entity identifier that is fixed over a period of time in relation to an entity in the target environment;
program instructions to weight the security monitoring rules according to a probability that the rule positively identifies the security attack;
program instructions to correlate outputs of multiple activated rules relating to an entity identifier that are activated over time in response to events occurring in the target environment;
program instructions to aggregate weightings from the multiple activated rules;
program instructions to determine a score for an entity relating to the entity identifier based on the aggregated weightings; and
program instructions to provide an alert in response to a score for an entity meeting a threshold.
16. The computer system ofclaim 15, wherein the program instructions to identify events in the target environment that are associated with the indication of the security attack on the target environment, further comprise program instructions to:
define an attack tree that includes events for performed on the target environment, wherein the attack tree defines paths of possible events in the security attack; and
select features of the attack tree are associated with the indication of the security attack on the target environment.
17. The computer system ofclaim 15, wherein selecting features is based on a degree of uniqueness of an activity compared to a normal activity in the target environment.
18. The computer system ofclaim 15, wherein weighting the security monitoring rules according to the probability that the rule positively identifies the security attack is based on an initial configuration with re-adjustment of weightings based on testing and analysis of security incidents in the target environment.
19. The computer system ofclaim 15, wherein an entity relates to an asset or person in the target environment and the entity identifier is one or more of: an Internet Protocol address, hostname, user name, media access control (MAC) address, or other entity identifier that is fixed over a period of time in relation to an entity.
20. The computer system ofclaim 15, wherein program instructions to determine the score for the entity relating to the entity identifier based on the aggregated weightings further comprise program instructions to:
produce an updated risk correlation score record in response to a rule activation.
US16/407,7642019-05-092019-05-09Composing and applying security monitoring rules to a target environmentActive2040-04-08US11245716B2 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US16/407,764US11245716B2 (en)2019-05-092019-05-09Composing and applying security monitoring rules to a target environment

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US16/407,764US11245716B2 (en)2019-05-092019-05-09Composing and applying security monitoring rules to a target environment

Publications (2)

Publication NumberPublication Date
US20200358803A1true US20200358803A1 (en)2020-11-12
US11245716B2 US11245716B2 (en)2022-02-08

Family

ID=73046861

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US16/407,764Active2040-04-08US11245716B2 (en)2019-05-092019-05-09Composing and applying security monitoring rules to a target environment

Country Status (1)

CountryLink
US (1)US11245716B2 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11403405B1 (en)2019-06-272022-08-02Architecture Technology CorporationPortable vulnerability identification tool for embedded non-IP devices
US11429713B1 (en)2019-01-242022-08-30Architecture Technology CorporationArtificial intelligence modeling for cyber-attack simulation protocols
CN115150052A (en)*2022-06-082022-10-04北京天融信网络安全技术有限公司Method, device, equipment and storage medium for tracking and identifying attack group
US11481517B2 (en)*2019-05-162022-10-25Check Point Serverless Security Ltd.System and method for determining permission profiles for computer executable functions
US11489862B2 (en)2020-01-222022-11-01Forcepoint LlcAnticipating future behavior using kill chains
US11503064B1 (en)2018-06-192022-11-15Architecture Technology CorporationAlert systems and methods for attack-related events
US11503075B1 (en)*2020-01-142022-11-15Architecture Technology CorporationSystems and methods for continuous compliance of nodes
US20230156019A1 (en)*2021-11-152023-05-18Arbor Networks, Inc.Method and system for scoring severity of cyber attacks
US11722515B1 (en)2019-02-042023-08-08Architecture Technology CorporationImplementing hierarchical cybersecurity systems and methods
US11838298B2 (en)2017-05-152023-12-05Forcepoint LlcGenerating a security risk persona using stressor data
US11888859B2 (en)2017-05-152024-01-30Forcepoint LlcAssociating a security risk persona with a phase of a cyber kill chain
US12120146B1 (en)2019-10-232024-10-15Architecture Technology CorporationSystems and methods for applying attack tree models and physics-based models for detecting cyber-physical threats
CN119003456A (en)*2024-07-242024-11-22深圳市龙岗区规划国土发展研究中心Rule base calling method, device, equipment and medium based on stock industrial area

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11423143B1 (en)*2017-12-212022-08-23Exabeam, Inc.Anomaly detection based on processes executed within a network
US11625366B1 (en)2019-06-042023-04-11Exabeam, Inc.System, method, and computer program for automatic parser creation
US11956253B1 (en)2020-06-152024-04-09Exabeam, Inc.Ranking cybersecurity alerts from multiple sources using machine learning
US12063226B1 (en)2020-09-292024-08-13Exabeam, Inc.Graph-based multi-staged attack detection in the context of an attack framework
GB2602628B (en)2020-12-312023-03-29British TelecommIdentifying Computer Systems for Malware Infection Mitigation
US12399984B1 (en)2023-06-132025-08-26Exabeam, Inc.System, method, and computer program for predictive autoscaling for faster searches of event logs in a cybersecurity system

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8024804B2 (en)*2006-03-082011-09-20Imperva, Inc.Correlation engine for detecting network attacks and detection method
US7937353B2 (en)*2007-01-152011-05-03International Business Machines CorporationMethod and system for determining whether to alter a firewall configuration
US8776226B2 (en)*2010-01-262014-07-08Bae Systems Information And Electronic Systems Integration Inc.Method and apparatus for detecting SSH login attacks
EP2737427A4 (en)*2011-07-292015-04-15Hewlett Packard Development CoSystems and methods for distributed rule-based correlation of events
JP5987627B2 (en)*2012-10-222016-09-07富士通株式会社 Unauthorized access detection method, network monitoring device and program
US9853964B2 (en)*2012-11-272017-12-26Robojar Pty LtdSystem and method for authenticating the legitimacy of a request for a resource by a user
WO2014142791A1 (en)2013-03-112014-09-18Hewlett-Packard Development Company, L.P.Event correlation based on confidence factor
US9276951B2 (en)*2013-08-232016-03-01The Boeing CompanySystem and method for discovering optimal network attack paths
US9563771B2 (en)*2014-01-222017-02-07Object Security LTDAutomated and adaptive model-driven security system and method for operating the same
US9350749B2 (en)*2014-10-062016-05-24Sap SeApplication attack monitoring
US20160182561A1 (en)*2014-12-182016-06-23Level 3 Communications, LlcRoute monitoring system for a communication network
US9712554B2 (en)2015-04-092017-07-18Accenture Global Services LimitedEvent correlation across heterogeneous operations
US10021115B2 (en)2015-11-032018-07-10Juniper Networks, Inc.Integrated security system having rule optimization
US10193906B2 (en)*2015-12-092019-01-29Checkpoint Software Technologies Ltd.Method and system for detecting and remediating polymorphic attacks across an enterprise
US10440036B2 (en)*2015-12-092019-10-08Checkpoint Software Technologies LtdMethod and system for modeling all operations and executions of an attack and malicious process entry
US9692784B1 (en)*2016-10-252017-06-27Fortress Cyber Security, LLCSecurity appliance
US10652278B2 (en)*2016-12-192020-05-12Forescout Technologies, Inc.Compliance monitoring
US10721239B2 (en)*2017-03-312020-07-21Oracle International CorporationMechanisms for anomaly detection and access management
CN107222491B (en)2017-06-222021-01-05北京工业大学Intrusion detection rule creating method based on industrial control network variant attack
WO2019025384A1 (en)*2017-08-022019-02-07British Telecommunications Public Limited CompanyMalicious host detection
US12170684B2 (en)*2018-07-252024-12-17Arizona Board Of Regents On Behalf Of Arizona State UniversitySystems and methods for predicting the likelihood of cyber-threats leveraging intelligence associated with hacker communities
US10868825B1 (en)*2018-08-142020-12-15Architecture Technology CorporationCybersecurity and threat assessment platform for computing environments
US11012472B2 (en)*2018-12-052021-05-18International Business Machines CorporationSecurity rule generation based on cognitive and industry analysis
US11194905B2 (en)*2019-04-092021-12-07International Business Machines CorporationAffectedness scoring engine for cyber threat intelligence services
US11451581B2 (en)*2019-05-202022-09-20Architecture Technology CorporationSystems and methods for malware detection and mitigation
JP7311350B2 (en)*2019-08-072023-07-19株式会社日立ソリューションズ MONITORING DEVICE, MONITORING METHOD, AND MONITORING PROGRAM

Cited By (21)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11838298B2 (en)2017-05-152023-12-05Forcepoint LlcGenerating a security risk persona using stressor data
US12212581B2 (en)2017-05-152025-01-28Forcepoint LlcUsing an entity behavior profile when performing human-centric risk modeling operations
US11888859B2 (en)2017-05-152024-01-30Forcepoint LlcAssociating a security risk persona with a phase of a cyber kill chain
US11888860B2 (en)2017-05-152024-01-30Forcepoint LlcCorrelating concerning behavior during an activity session with a security risk persona
US11888861B2 (en)2017-05-152024-01-30Forcepoint LlcUsing an entity behavior catalog when performing human-centric risk modeling operations
US11843613B2 (en)2017-05-152023-12-12Forcepoint LlcUsing a behavior-based modifier when generating a user entity risk score
US11503064B1 (en)2018-06-192022-11-15Architecture Technology CorporationAlert systems and methods for attack-related events
US11997129B1 (en)2018-06-192024-05-28Architecture Technology CorporationAttack-related events and alerts
US11429713B1 (en)2019-01-242022-08-30Architecture Technology CorporationArtificial intelligence modeling for cyber-attack simulation protocols
US12032681B1 (en)2019-01-242024-07-09Architecture Technology CorporationSystem for cyber-attack simulation using artificial intelligence modeling
US11722515B1 (en)2019-02-042023-08-08Architecture Technology CorporationImplementing hierarchical cybersecurity systems and methods
US11481517B2 (en)*2019-05-162022-10-25Check Point Serverless Security Ltd.System and method for determining permission profiles for computer executable functions
US12019756B1 (en)2019-06-272024-06-25Architecture Technology CorporationAutomated cyber evaluation system
US11403405B1 (en)2019-06-272022-08-02Architecture Technology CorporationPortable vulnerability identification tool for embedded non-IP devices
US12120146B1 (en)2019-10-232024-10-15Architecture Technology CorporationSystems and methods for applying attack tree models and physics-based models for detecting cyber-physical threats
US11503075B1 (en)*2020-01-142022-11-15Architecture Technology CorporationSystems and methods for continuous compliance of nodes
US11489862B2 (en)2020-01-222022-11-01Forcepoint LlcAnticipating future behavior using kill chains
US11570197B2 (en)*2020-01-222023-01-31Forcepoint LlcHuman-centric risk modeling framework
US20230156019A1 (en)*2021-11-152023-05-18Arbor Networks, Inc.Method and system for scoring severity of cyber attacks
CN115150052A (en)*2022-06-082022-10-04北京天融信网络安全技术有限公司Method, device, equipment and storage medium for tracking and identifying attack group
CN119003456A (en)*2024-07-242024-11-22深圳市龙岗区规划国土发展研究中心Rule base calling method, device, equipment and medium based on stock industrial area

Also Published As

Publication numberPublication date
US11245716B2 (en)2022-02-08

Similar Documents

PublicationPublication DateTitle
US11245716B2 (en)Composing and applying security monitoring rules to a target environment
US10666670B2 (en)Managing security breaches in a networked computing environment
US12301628B2 (en)Correlating network event anomalies using active and passive external reconnaissance to identify attack information
US10834108B2 (en)Data protection in a networked computing environment
US11824894B2 (en)Defense of targeted database attacks through dynamic honeypot database response generation
US11057407B2 (en)Detecting malware attacks using extracted behavioral features
US11228612B2 (en)Identifying cyber adversary behavior
US11025674B2 (en)Cybersecurity profiling and rating using active and passive external reconnaissance
US11522905B2 (en)Malicious virtual machine detection
JP7522130B2 (en) System and method for SIEM rule sorting and conditional execution - Patents.com
US10742664B2 (en)Probabilistically detecting low-intensity, multi-modal threats using synthetic events
JP2024540116A (en) Network Threat Analysis System
US11966470B2 (en)Detecting and preventing distributed data exfiltration attacks
US11481478B2 (en)Anomalous user session detector
US10291644B1 (en)System and method for prioritizing endpoints and detecting potential routes to high value assets
US20230254334A1 (en)Intelligent workflow for protecting servers from outside threats
US11425156B2 (en)Dynamic gathering of attack symptoms
US20240414184A1 (en)Network security assessment based upon identification of an adversary

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW YORK

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ROELOFS, THOMAS M.;PRANAM, CODUR S.;REEL/FRAME:049130/0772

Effective date:20190502

FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPPInformation on status: patent application and granting procedure in general

Free format text:PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED

STPPInformation on status: patent application and granting procedure in general

Free format text:PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCFInformation on status: patent grant

Free format text:PATENTED CASE

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:4


[8]ページ先頭

©2009-2025 Movatter.jp